Assigning User Roles and Permissions - User Guide
Overview
User roles and permissions determine what features and functionality a user can access within the system.
Depending on the level of access required, a user may need to be assigned one or more roles or permissions. These are managed through the Employee record in the Directory.
This guide explains how to assign roles and permissions to a user.
Assigning the correct roles ensures users have the appropriate level of access while maintaining system security and control.
For more information about the permissions associated with each role, refer to the Roles & Permissions guide.
Assigning Roles and Permissions
Follow the steps below to assign roles or permissions to a user.
Step 1: Access the Directory
- Navigate to the Directory
- Select Employees
This will display a list of all employees configured within the system.
Step 2: Locate the User
- Find the employee whose access needs to be updated
- Click on the user’s name to open their employee record
Step 3: Open the Employee Update Screen
- Click Update
- Select Employee
- Click Update Employee
This will open the employee configuration screen.
Step 4: View Permission Settings
- Click Actions
- Select View Permissions
The Permissions screen will appear, allowing you to assign the appropriate roles and permissions.
Step 5: Assign Roles and Permissions
Select the relevant roles or permissions required for the user
You must assign at least one role with the (System) tag. This ensures the user has the required system-level access to operate within the platform.
Step 6: Save the Changes
Once the appropriate permissions have been selected:
Review the permissions assigned
Click Save in the bottom right corner
The updated roles and permissions will apply immediately.
Best Practices
Assign only the permissions required for the user’s role
Ensure at least one role with the (System) tag is selected
Review permissions periodically to maintain security and compliance
Incorrect permission settings may prevent users from accessing required features or may grant unintended access.